Sciweavers

1401 search results - page 25 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
CSREASAM
2009
13 years 8 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
VLDB
1998
ACM
134views Database» more  VLDB 1998»
13 years 11 months ago
Secure Buffering in Firm Real-Time Database Systems
The design of secure buffer managers for database systems supporting real-time applications with firm deadlines is studied here. We first identify the design challenges and then p...
Binto George, Jayant R. Haritsa
AOSD
2010
ACM
14 years 26 days ago
A permission system for secure AOP
The integration of third-party aspects into applications creates security challenges. Due to the intrusive impact of aspects, one cannot guarantee that the dynamic composition of ...
Wouter De Borger, Bart De Win, Bert Lagaisse, Wout...
JBI
2007
122views Bioinformatics» more  JBI 2007»
13 years 7 months ago
A framework for information system usage in collaborative care
Clinical information systems (CIS) can affect the quality of patient care. In this paper, we focus on CIS use in the collaborative treatment of chronic diseases. We have develope...
David A. Dorr, Spencer S. Jones, Adam B. Wilcox
NSPW
2006
ACM
14 years 1 months ago
E-Prime for security: a new security paradigm
This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security ...
Steven J. Greenwald